Talk With an Expert

Vulnerability Identification and Remediation Through Best Security Practices

Vulnerability Identification and Remediation Through Best Security Practices (PDF, 2.53MB)Published: 07 Dec, 2001
Created by:
BJ Bellamy

These days, we hear a lot about Pen-Testing (attempting to penetrate a system's security layers in order to demonstrate security risk. While these types of studies are useful and effective, they tend to require specific skills, training, and experience in areas that network professionals are usually not exposed to. This paper looks at Vulnerability Identification Studies which focus on identifying the enticements, common vulnerabilities, and information leakage, the things that account for most of the risk to IT (Information Technology) that we face today.